Patents by Inventor ARVIND K. RAGHU

ARVIND K. RAGHU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11909730
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Grant
    Filed: October 11, 2022
    Date of Patent: February 20, 2024
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20230032116
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Application
    Filed: October 11, 2022
    Publication date: February 2, 2023
    Applicant: Texas Instruments Incorporated
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 11470077
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Grant
    Filed: January 26, 2021
    Date of Patent: October 11, 2022
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 11368393
    Abstract: Disclosed embodiments relate to a Hierarchical Do-Dag based RPL (H-DOC) network configuration where the network address of each node corresponds to its location within the hierarchical network. Network addresses are initialized hierarchically. Candidate patent nodes signal availability. Candidate child nodes respond to a selected candidate parent node with a temporary address. The selected candidate parent node acknowledges selection and communicates a hierarchical address for the child node in a transmission to the temporary address. The child node changes its address to the hierarchical address from the parent node. When a node switches parent nodes, it signals the old parent node to deallocate it as a child node, and then signals a selected candidate parent node with a temporary address.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: June 21, 2022
    Assignee: Texas Instmments Incorporated
    Inventors: Ramanuja Vedantham, Kumaran Vijayasankar, Arvind K. Raghu, Ariton E. Xhafa
  • Publication number: 20210378002
    Abstract: A network includes a parent node and at least one child node configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.
    Type: Application
    Filed: August 16, 2021
    Publication date: December 2, 2021
    Inventors: Arvind K. Raghu, Ariton E. Xhafa, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 11096208
    Abstract: A network includes a parent node and at least one child node configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: August 17, 2021
    Assignee: Texas Instruments Incorporated
    Inventors: Arvind K. Raghu, Ariton E. Xhafa, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20210152546
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Application
    Filed: January 26, 2021
    Publication date: May 20, 2021
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 10938803
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: March 2, 2021
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20200099613
    Abstract: Disclosed embodiments relate to a Hierarchical Do-Dag based RPL (H-DOC) network configuration where the network address of each node corresponds to its location within the hierarchical network. Network addresses are initialized hierarchically. Candidate patent nodes signal availability. Candidate child nodes respond to a selected candidate parent node with a temporary address. The selected candidate parent node acknowledges selection and communicates a hierarchical address for the child node in a transmission to the temporary address. The child node changes its address to the hierarchical address from the parent node. When a node switches parent nodes, it signals the old parent node to deallocate it as a child node, and then signals a selected candidate parent node with a temporary address.
    Type: Application
    Filed: November 26, 2019
    Publication date: March 26, 2020
    Inventors: Ramanuja Vedantham, Kumaran Vijayasankar, Arvind K. Raghu, Ariton E. Xhafa
  • Patent number: 10491514
    Abstract: This invention is an improvement of a Hierarchical Do-Dag based RPL (H-DOC) network configuration where the network address of each node corresponds to its location within the hierarchical network. Network addresses are initialized hierarchically. Candidate patent nodes signal availability. Candidate child nodes respond to a selected candidate parent node with a temporary address. The selected candidate parent node acknowledges selection and communicates a hierarchical address for the child node in a transmission to the temporary address. The child node changes its address to the hierarchical address from the parent node. When a node switches parent nodes, it signals the old parent node to deallocate it as a child node, and then signals a selected candidate parent node with a temporary address.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: November 26, 2019
    Assignee: TEXAS INSTRUMENTS INCORPORATION
    Inventors: Ramanuja Vedantham, Kumaran Vijayasankar, Arvind K. Raghu, Ariton E. Xhafa
  • Publication number: 20190245844
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Application
    Filed: January 18, 2019
    Publication date: August 8, 2019
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20190069315
    Abstract: A network includes a parent node and at least one child node configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.
    Type: Application
    Filed: October 30, 2018
    Publication date: February 28, 2019
    Inventors: Arvind K. Raghu, Ariton E. Xhafa, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 10187376
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Grant
    Filed: July 28, 2016
    Date of Patent: January 22, 2019
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Patent number: 10117267
    Abstract: A network includes a parent node and at least one child node that is configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.
    Type: Grant
    Filed: August 3, 2015
    Date of Patent: October 30, 2018
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Arvind K. Raghu, Ariton E. Xhafa, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20170063843
    Abstract: Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.
    Type: Application
    Filed: July 28, 2016
    Publication date: March 2, 2017
    Inventors: Kumaran Vijayasankar, Oliver Shih, Arvind K. Raghu, Ramanuja Vedantham, Xiaolin Lu
  • Publication number: 20170063685
    Abstract: This invention is an improvement of a Hierarchical Do-Dag based RPL (H-DOC) network configuration where the network address of each node corresponds to its location within the hierarchical network. Network addresses are initialized hierarchically. Candidate patent nodes signal availability. Candidate child nodes respond to a selected candidate parent node with a temporary address. The selected candidate parent node acknowledges selection and communicates a hierarchical address for the child node in a transmission to the temporary address. The child node changes its address to the hierarchical address from the parent node. When a node switches parent nodes, it signals the old parent node to deallocate it as a child node, and then signals a selected candidate parent node with a temporary address.
    Type: Application
    Filed: August 29, 2016
    Publication date: March 2, 2017
    Inventors: Ramanuja Vedantham, Kumaran Vijayasankar, Arvind K. Raghu, Ariton E. Xhafa
  • Publication number: 20160174192
    Abstract: A network includes a parent node and at least one child node that is configured to communicate with the parent node via a wireless network protocol. The parent node includes a broadcast coordinator to transmit a broadcast message from the parent node to the child node at predetermined time intervals according to the wireless network protocol. A scheduler generates a scheduling packet that is communicated in the broadcast message. The scheduling packet includes a data field to instruct each child node to activate and receive data communicated from the parent node in a prescribed time slot following the broadcast message that is defined by the scheduling packet.
    Type: Application
    Filed: August 3, 2015
    Publication date: June 16, 2016
    Inventors: ARVIND K. RAGHU, ARITON E. XHAFA, RAMANUJA VEDANTHAM, XIAOLIN LU